Page 2 of 7 results (0.004 seconds)

CVSS: 3.6EPSS: 0%CPEs: 16EXPL: 0

xinetd 2.1.8 and earlier runs with a default umask of 0, which could allow local users to read or modify files that are created by an application that runs under xinetd but does not set its own safe umask. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000404 http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-024-01 http://www.debian.org/security/2001/dsa-063 http://www.iss.net/security_center/static/6657.php http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-055.php3 http://www.linuxsecurity.com/advisories/other_advisory-1469.html http://www.redhat.com/support/errata/RHSA-2001-075.html http://www.securityfocus.com/bid/2826 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 1

xinetd 2.1.8.x does not properly restrict connections if hostnames are used for access control and the connecting host does not have a reverse DNS entry. • http://www.debian.org/security/2000/20000619 http://www.securityfocus.com/bid/1381 http://www.synack.net/xinetd https://exchange.xforce.ibmcloud.com/vulnerabilities/4986 •